By Sally Ann Vazquez-Castellanos, Esq.
Published on April 17, 2026 at approximately 7:01 am.
Overview
Following the December 2015 terrorist attack in San Bernardino, federal investigators sought access to an encrypted Apple iPhone 5C used by one of the attackers. The device was secured by encryption protocols designed by Apple Inc to protect user data against unauthorized access.
Unable to unlock the device, the government obtained a court order under the All Writs Act compelling Apple to assist.
Apple declined.
The Legal Question
The dispute raised a critical issue:
Can the government compel a private company to create software that undermines its own security architecture?
The government argued necessity—framing the request as a lawful extension of investigative authority in a national security context. Apple framed the issue differently: as a question of limits, not capability.
Apple’s Position
Apple’s refusal rested on several legal and structural arguments:
The All Writs Act does not authorize courts to compel the creation of new technology where Congress has not explicitly legislated such authority. Compliance would impose an unreasonable burden and establish a sweeping precedent. Creating a “backdoor” would compromise the security of all users—not just the device at issue. Compelled code-writing raises First Amendment concerns.
In effect, Apple argued that the request was not about unlocking a phone—it was about reengineering the security model of modern digital life.
Procedural Outcome
The case did not result in a judicial ruling. The government ultimately withdrew its request after obtaining access through a third-party vendor.
As a result:
No binding precedent was established. The constitutional and statutory issues remain unresolved. The policy debate continues to evolve across courts, legislatures, and international frameworks.
Broader Implications
Encryption and Legal Authority
When the law simply cannot keep pace with technology, we must begin to ask ourselves what are the repercussions when government permits unfettered access to the smartphone?
It’s an extremely fair question to ask when attorneys, clients, judicial officers and their families, friends and business associates increasingly become targets around the country.
It’s not just the smartphone. Consider all of the things your devices may be connected to, including televisions, refrigerators, thermostats, security systems and cameras, as well as vehicles that connect to satellite radio and other services marketed as luxury services.
This case illustrates how legacy statutes like the All Writs Act are being applied to modern technologies in ways that raise unresolved separation-of-powers concerns.
Privatization of Surveillance Capability
The government’s reliance on third-party actors signals a shift toward outsourced technical access—raising additional accountability and oversight issues.
Consumer Protection and Family Law Considerations
For individuals and families, the implications are practical and immediate:
Personal devices contain highly sensitive communications and records. Compromised security can affect reputation, safety, and legal disputes—including custody matters. Data integrity is increasingly tied to legal rights and outcomes.
Limitations on Access
The San Bernardino dispute represents more than a conflict between a corporation and the government. It is a dramatic change in how the law conceptualizes access to the individual in a digital environment.
Corporations do have “business models” to protect. However, while we all check off those little boxes (or not)—in today’s marketplace we also tend to require businesses to be responsible with our data. I would say that this especially holds true for all businesses that deal with our medical data or children’s data.
When it comes to the smartphone—with do seem to be entrusting apps and every single service or provider connected to that smartphone with our lives. I do believe that while most companies want to cooperate with the government to fight the war against terror, but they also do not want to be conscripted into service.
What types of harms do you cause businesses, individuals and industries when there are no limitations placed on access?
If a device can be compelled open without limits, the next question becomes unavoidable:
What are the limits when technology moves beyond devices and toward cognition?
Emerging frameworks around cognitive liberty, neural privacy, and mental autonomy suggest that this case is an early chapter in a much larger legal narrative—one that will define the boundaries of personal sovereignty in the 21st century.
Sources (ChatGPT)
In re Apple Inc., No. 5:16-cm-00010 (C.D. Cal. Feb. 16, 2016) (Order Compelling Assistance Under the All Writs Act)
All Writs Act, 28 U.S.C. § 1651(a) Federal Bureau of Investigation, “Statement on iPhone Access in San Bernardino Case” (Mar. 28, 2016)
U.S. Department of Justice, Motion to Vacate Order (C.D. Cal. Mar. 28, 2016)
Tim Cook, “A Message to Our Customers” (Apple Inc., Feb. 16, 2016)
Electronic Frontier Foundation, Apple v. FBI: Overview and Analysis
American Civil Liberties Union, The San Bernardino iPhone Case Explained.
Legal Disclaimer
This article is provided for informational and educational purposes only and does not constitute legal advice. Viewing or interacting with this content does not create an attorney-client relationship. Individuals and entities should consult qualified legal counsel regarding their specific circumstances.
Cognitive Liberty Notice:
This publication reflects ongoing legal and policy considerations relating to cognitive liberty, neural privacy, and the protection of mental autonomy. As emerging technologies increasingly intersect with human cognition, it’s important that we all begin to recognize the importance of safeguarding not only personal data, but the integrity of individual thought and mental processes as a matter of fundamental rights.
